Installation and upgrades Faspex 5 is a web application. Installation only applies to system administrators. Secret key management and password protectionFaspex 5.0.8 and later uses secret keys and provides the option to set a password during the installation.Installing Faspex for the first timeUpgrading FaspexUpgrading instructions for Faspex 5.Patching container imagesIt is possible to upgrade Faspex 5 container images to the latest version within the current tag. You can do this when one or more new container images have been pushed to the same tag, for example in the case of bug and security fixes. You don't need to upgrade the Faspex 5 RPM to complete this procedure.High-availability (HA) installationFaspex can be deployed in a HA environment by setting up multiple Faspex instances to use a shared remote database.Backup and restoreInformation related to backing up and restoring Faspex 5 from a backup.Uninstalling faspexThere are two methods to uninstall Faspex: simple uninstall and deep uninstall.Docker Compose customizationsThis section describes the process of adding custom values to the Docker Compose templates in Faspex 5.0.8 and later.Running Faspex 5 as non-root on systems with Podman runtimeRun Faspex 5 as a non-root user for enhanced security and resource efficiency.Tips for installing Docker or PodmanThe purpose of this section is to provide tips on the installation of Docker or Podman, this information should only be used as a complement. For installation instructions visit the official documentation of Docker and Podman.Configure Nginx settingsFaspex 5 uses Nginx as a reverse proxy to route traffic to the appropriate container. You can customize Nginx configuration files and update your SSL certificate and key using the files at /opt/aspera/faspex/conf/nginx.Limiting EgressLimiting egress allows administrators to control the amount of data leaving their network. This feature helps organizations to regulate the flow of outbound data and ensure that sensitive information is not being shared outside their network without proper authorization.